Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-c9qw-1g2p-qqcr
Vulnerability ID VCID-c9qw-1g2p-qqcr
Aliases CVE-2017-3544
Summary Multiple vulnerabilities have been found in IcedTea, the worst of which may allow execution of arbitrary code.
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
ssvc Track https://access.redhat.com/errata/RHSA-2017:1108
ssvc Track https://access.redhat.com/errata/RHSA-2017:1109
ssvc Track https://access.redhat.com/errata/RHSA-2017:1117
ssvc Track https://access.redhat.com/errata/RHSA-2017:1118
ssvc Track https://access.redhat.com/errata/RHSA-2017:1119
ssvc Track https://access.redhat.com/errata/RHSA-2017:1204
ssvc Track https://access.redhat.com/errata/RHSA-2017:1220
ssvc Track https://access.redhat.com/errata/RHSA-2017:1221
ssvc Track https://access.redhat.com/errata/RHSA-2017:1222
ssvc Track https://access.redhat.com/errata/RHSA-2017:3453
cvssv3 3.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
epss 0.0038 https://api.first.org/data/v1/epss?cve=CVE-2017-3544
cvssv2 2.6 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2017-3544
cvssv3 3.7 https://nvd.nist.gov/vuln/detail/CVE-2017-3544
ssvc Track https://security.gentoo.org/glsa/201705-03
ssvc Track https://security.gentoo.org/glsa/201707-01
ssvc Track https://source.android.com/security/bulletin/2017-07-01
ssvc Track http://www.debian.org/security/2017/dsa-3858
ssvc Track http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
ssvc Track http://www.securityfocus.com/bid/97745
ssvc Track http://www.securitytracker.com/id/1038286
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json
https://api.first.org/data/v1/epss?cve=CVE-2017-3544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://source.android.com/security/bulletin/2017-07-01
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.securityfocus.com/bid/97745
http://www.securitytracker.com/id/1038286
1443068 https://bugzilla.redhat.com/show_bug.cgi?id=1443068
cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update141:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update131:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update121:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update141:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update_131:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update_121:*:*:*:*:*:*
cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:r28.3.13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
CVE-2017-3544 https://nvd.nist.gov/vuln/detail/CVE-2017-3544
GLSA-201705-03 https://security.gentoo.org/glsa/201705-03
GLSA-201707-01 https://security.gentoo.org/glsa/201707-01
RHSA-2017:1108 https://access.redhat.com/errata/RHSA-2017:1108
RHSA-2017:1109 https://access.redhat.com/errata/RHSA-2017:1109
RHSA-2017:1117 https://access.redhat.com/errata/RHSA-2017:1117
RHSA-2017:1118 https://access.redhat.com/errata/RHSA-2017:1118
RHSA-2017:1119 https://access.redhat.com/errata/RHSA-2017:1119
RHSA-2017:1204 https://access.redhat.com/errata/RHSA-2017:1204
RHSA-2017:1220 https://access.redhat.com/errata/RHSA-2017:1220
RHSA-2017:1221 https://access.redhat.com/errata/RHSA-2017:1221
RHSA-2017:1222 https://access.redhat.com/errata/RHSA-2017:1222
RHSA-2017:3453 https://access.redhat.com/errata/RHSA-2017:3453
USN-3275-1 https://usn.ubuntu.com/3275-1/
USN-3275-2 https://usn.ubuntu.com/3275-2/
No exploits are available.

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1108

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1109

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1117

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1118

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1119

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1204

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1220

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1221

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:1222

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://access.redhat.com/errata/RHSA-2017:3453
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3544.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2017-3544
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2017-3544
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://security.gentoo.org/glsa/201705-03

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://security.gentoo.org/glsa/201707-01

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at https://source.android.com/security/bulletin/2017-07-01

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at http://www.debian.org/security/2017/dsa-3858

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at http://www.securityfocus.com/bid/97745

Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-07T15:44:53Z/ Found at http://www.securitytracker.com/id/1038286
Exploit Prediction Scoring System (EPSS)
Percentile 0.59359
EPSS Score 0.0038
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:12:08.500087+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/201707-01 38.0.0